Edward Snowden thought he was exposing the National Security Agency's lawless spying on Americans. But the more information emerges about how the NSA conducts surveillance, the clearer it becomes that this is an agency obsessed with complying with the complex rules limiting its authority.

That’s an interesting interpretation of the recently released documents, given that one of the two main FISA court opinions released says the NSA was engaged in “systemic overcollection” of American Internet data for years, and committed “longstanding and pervasive violations of the prior orders in this matter.” The court summarized what it called the government’s “frequent failures to comply with the [surveillance program’s] terms” and their “apparent widespread disregard of [FISA court imposed] restrictions.”

Crovitz:

[The documents] portray an agency acting under the watchful eye of hundreds of lawyers and compliance officers.

Again, this is not what the actual FISA court opinions portray. “NSA’s record of compliance with these rules has been poor,” and “those responsible for conducting oversight failed to do so effectively,” FISA court Judge Bates wrote in the key opinion released last week. In another FISA court opinion from 2009, released two months ago, the NSA admitted that not a single person in the entire agency accurately understood or could describe the NSA’s whole surveillance system to the court.

These documents disprove one of Mr. Snowden's central claims: "I, sitting at my desk, certainly had the authority to wiretap anyone, from you or your accountant, to a federal judge, to even the president if I had a personal email," he told the Guardian, a British newspaper.

Here, Crovitz is setting up a strawman. Snowden wasn’t talking about the NSA’s legal authority, but their technical authority to conduct such searches. Snowden was likely referring to XKeyScore, which the Guardian reported allowed NSA analysts to “search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals.”

We actually have a specific example that proves Snowden’s point. As the New York Timesreported in 2009, an NSA analyst “improperly accessed” former President Bill Clinton’s personal email. More recently, we’ve learned that the NSA analysts abused the agency vast surveillance powers to spying on ex-spouses or former lovers.

Crovitz:

The NSA also released the legal arguments the Justice Department used in 2006 to justify collection of phone metadata-the telephone number of the calling and called parties and the date, time and duration of the call.

...

Metadata collection is about connecting the dots linking potential terrorist accomplices. The Clinton administration created barriers to the use of metadata, which the 9/11 Commission concluded let the terrorists avoid detection. Since then, metadata has helped stop dozens of plots, including an Islamist plan to blow up the New York Stock Exchange in 2008.

Again, not true. As Intelligence Committee members Sen. Ron Wyden and Sen. Mark Udall have continually emphasized, there is “no evidence” that the phone metadata program is effective at stopping terrorists. Independent analyses have come to the same conclusion. When called out on that number in a Congressional hearing, even NSA Director Keith Alexander admitted the number was exaggerated.

The only “disrupted plot” the NSA can point to that was solely the work of the phone metadata program was a case where a man from San Diego sent a few thousand dollars to the al-Shabaab organization in Africa in 2008. In other words, the metadata did not disrupt an active terrorist plot inside the US at all.

Crovitz:

The declassified brief from 2006 made clear that such metadata "would never even be seen by any human being unless a terrorist connection were first established," estimating that "0.000025% or one in four million" of the call records "actually would be seen by a trained analyst."

The major 2009 FISA court opinion released in September, that apparently Mr. Crovitz either didn’t read or conveniently left out of his piece, showed that the NSA had been systematically querying part of this phone records database for years for numbers that the agency did not have a “reasonable articulable suspicion” were involved in terrorism—as they were required to have by the FISA court. Of the more than 17,000 numbers that the NSA was querying everyday, the agency only had “reasonable articulable suspicion” for approximately 1,800 of them.

The FISA court concluded, five years after the metadata program was brought under a legal framework, that it had been “so frequently and systematically violated that it can fairly be said that this critical element of the overall…regime has never functioned effectively.”

These documents clearly do not paint a picture of an agency with a clean privacy record and a reputation for following court rules, as Mr. Crovitz claims, and in fact, they show why it is vital Congress passes substantive NSA reform immediately. You can go here to take action.

Related Updates

Lt. Gen. Paul Nakasone, the new nominee to direct the NSA, faced questions Thursday from the Senate Select Committee on Intelligence about how he would lead the spy agency. One committee member, Senator Ron Wyden (D-OR), asked the nominee if he and his agency could avoid the mistakes of...

Once-secret surveillance court orders obtained by EFF last week show that even when the court authorizes the government to spy on specific Americans for national security purposes, that authorization can be misused to potentially violate other people’s civil liberties.
These documents raise larger questions about whether the government can...

Last month, Congress reauthorized Section 702, the controversial law the NSA uses to conduct some of its most invasive electronic surveillance. With Section 702 set to expire, Congress had a golden opportunity to fix the worst flaws in the NSA’s surveillance programs and protect Americans’ Fourth Amendment rights...

President Donald Trump’s first State of the Union address last night was remarkable for two reasons: for what he said, and for what he didn’t say.
The president took enormous pride last night in claiming to have helped “extinguish ISIS from the face of the Earth.”
But he failed to...

Dear friends,
Today, the United States Congress struck a significant blow against the basic human right to read, write, learn, and associate free of government’s prying eyes.
Goaded by those who let fear override democratic principles, some members of Congress shuttered public debate in order to pass a bill...

UPDATE, January 12, 2018: The Senate could vote Tuesday on a disastrous NSA surveillance extension bill that violates the Fourth Amendment. Click the link at the bottom of the page to email your Senator today and tell them to oppose bill S. 139.
The House of Representatives cast a deeply...

Multiple nonprofit organizations and policy think tanks, and one company have recently joined ranks to limit broad NSA surveillance. Though our groups work for many causes— freedom of the press, shared software development, universal access to knowledge, equal justice for all—our voices are responding to the same threat: the possible...

The Supreme Court announced today that it will not review a lower court’s ruling in United States v. Mohamud, which upheld warrantless surveillance of an American citizen under Section 702 of the Foreign Intelligence Surveillance Act. EFF had urged the Court to take up Mohamud because this...

One of the government’s most powerful surveillance tools is scheduled to sunset in less than three weeks, and, for months, EFF has fought multiple legislative attempts to either extend or expand the NSA’s spying powers—warning the public, Representatives, and Senators about circling bills that threaten Americans’ privacy. But the frenetic...

If you’ve been following EFF’s work, you’ll know that we’ve been fighting against the creeping surveillance state for over 20 years. Often, this means pushing back against the National Security Agency’s dragnet surveillance programs, but as new technology becomes available, new threats emerge.
Here are some of the biggest legislative...